D4Vinci / elpscrkLinks
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
☆912Updated last year
Alternatives and similar repositories for elpscrk
Users that are interested in elpscrk are comparing it to the libraries listed below
Sorting:
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,083Updated last month
- Hide your payload into .jpg file☆399Updated 4 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,238Updated 3 years ago
- Image Payload Creating/Injecting tools☆1,284Updated 2 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆746Updated last month
- Automated WPA/WPA2 PSK attack tool.☆618Updated 4 years ago
- Crack hashes in seconds.☆1,857Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,189Updated last year
- Websploit is a high level MITM framework☆1,226Updated 2 years ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,237Updated 6 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆768Updated 5 years ago
- Automatically brute force all services running on a target.☆2,197Updated last year
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆477Updated last month
- Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily fin…☆794Updated last month
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,230Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆628Updated last year
- Hydra Password Cracking Cheetsheet☆414Updated 5 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,497Updated 5 months ago
- MSFvenom Payload Creator (MSFPC)☆1,307Updated 4 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆461Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,941Updated 2 months ago
- An advanced multithreaded admin panel finder written in python.☆832Updated last year
- Search for leaked credentials☆1,374Updated 4 years ago
- Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder☆603Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆518Updated last year
- WiFi Penetration Testing Guide☆661Updated 2 years ago
- Reconnaissance Swiss Army Knife☆1,993Updated 5 years ago
- Community-built scenarios for Wifiphisher☆379Updated 4 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆620Updated 8 months ago
- All In One Web Recon☆2,633Updated 9 months ago